.

.

Along with others, I’ve spent the last four years documenting the extreme, often unprecedented, commitment to secrecy that this president has exhibited, including his vindictive war on whistleblowers, his refusal to disclose even the legal principles underpinning his claimed war powers of assassination, and his unrelenting, Bush-copying invocation of secrecy privileges to prevent courts even from deciding the legality of his conduct (as a 2009 headline on the Obama-friendly TPM site put it: “Expert Consensus: Obama Mimics Bush On State Secrets”). Just this week, the Associated Press conducted a study proving that last year, the Obama administration has rejected more FOIA requests on national security grounds than in any year since Obama became president, and quoted Alexander Abdo, an ACLU staff attorney for its national security project, as follows: “We’ve seen a meteoric rise in the number of claims to protect secret law, the government’s interpretations of laws or its understanding

.

.

Thousands of black plastic bags filled with Jewish religious artifacts line a dirt road in the woods near where Larry Simons lives. Nearby, 10 tractor-trailers sit filled with the bags, recently unearthed from their burial ground. The bags are part of an Orthodox Jewish custom known as shaimos, where Jewish books and other sacred objects that are no longer of use must be buried. “The whole thing troubles me because, one, I am Jewish,” the 76-year-old Simons said, as he walked passed the piles of bags. “As a Jewish person, I do not like to be denigrated. But when (I see) what I perceive as an abuse … of the law, it bothers me.” What concerns Simons, and the state Department of Environmental Protection, is that these bags were buried illegally in the woods in Jackson and Lakewood. A state Superior Court judge ordered the rabbi overseeing the site, Chaim Abadi, to remove the bags. But nearly a year later, Abadi is still searching for a new location for the artifacts

.

.

The prosecution alleges that, at a football party last summer, the West Virginia girl who multiple witnesses have described as incapacitated to the point of incoherence and unconsciousness lay shirtless on a yard, vomiting, while a group of guys offered $3 to piss on her. Next, she was allegedly sexually assaulted multiple times, ranging from digital penetration to attempted oral rape. Photographs taken during the assault, as well as a video in which a witness described the “dead girl” as “so raped,” were distributed throughout the town. As Jane Doe tried to learn what happened to her, the boys shared their alleged sexual assault with each other through texts and e-mails. “Hey buddy…you want to send me that pic because you love me?” one boy texted Mays, while Jane’s Doe friend commented about the same photo, “If that is [semen] on you that is [expletive] crazy.”

.

.

Your _LIVESON twitter account is created – it will keep tweeting even after you’ve passed away. _LIVESON A.I. analyses your main twitter feed. Learning about your likes, tastes, syntax. Tweets begin to populate your _LIVESON feed. Help it become a better you by giving feedback. Nominate an executor to your _LIVESON ‘Will’. They can decide to keep your account ‘live’.

.

.

data have different valences; data are always mediated. They must be contextualized by an interpretive community — pieces of data don’t automatically dictate how they must be interpreted by anyone who sees it. They are available to be put to whatever use by those with the authority to contextualize them. And more data doesn’t automatically make for a clearer picture. It just makes for more interpretative work, more exercises of power by the interpreters, more occasions where power might need to be resisted. In other words, data are not inherently a weapon against power, as transparency advocates sometimes seem to suggest; they are also a tool of power. A reputation is constituted by who gets to interpret data and for what reasons; it is determined by power relations. Amassing more data won’t somehow undo the hierarchy; it just gives people in the position to impose social judgments more information to rationalize their prejudices and protect their privileges.

.

.

For the first time, NSA chief and head of the U.S. Cyber Command Gen. Keith Alexander admitted America is ready to attack in cyberspace. Never before has a U.S. official acknowledged that the U.S. government is working on or is in possession of malware capable of attacking a foreign nation in a cyber conflict, despite the fact that at least one attack — the famous Stuxnext worm — has been attributed to the U.S. On Wednesday, in his annual testimony to the House Armed Services Committee, Alexander took the cyberwar rethoric coming out of Washington up a notch. “I would like to be clear that this team, this defend-the-nation team, is not a defensive team,” he said. “This is an offensive team.” In other words, this cyber army is ready to retaliate in case of a cyber attack against the United States.

.

.

Big Sugar has spent decades paying its way into politicians’ hearts, demanding price controls and tariffs that boost profits and artificially inflate sugar prices, and using its political clout to establish a permanent life-support mechanism for an industry whose major product is causing many Americans to die.

.

.

A scandal in a Massachusetts crime lab continues to reverberate throughout the state’s legal system. Several months ago, Annie Dookhan, a former chemist in a state crime lab, told police that she messed up big time. Dookhan now stands accused of falsifying test results in as many as 34,000 cases. As a result, lawyers, prosecutors and judges used to operating in a world of “beyond a reasonable doubt” now have nothing but doubt. Already, hundreds of convicts and defendants have been released because of the scandal. Now, the state’s highest court may weigh in on how these cases should be handled. “I don’t think anyone ever perceived that one person was capable of causing this much chaos,” says Norfolk County District Attorney Michael Morrisey, one of many DAs now digging through old drug cases, trying to sort out how many should now be considered tainted.

.

.

Femen activists appeared amidst the demonstrators wearing costumes of sexy nuns. The activists were topless as usual, with slogans written across their chests. They were spraying demonstrators with white liquid calling it “Jesus’ semen.”

.

.

In Albania, 750,000 Communist-era bunkers populate the landscape, relics of the paranoia and skewed priorities of former dictator Enver Hoxha. Now they exist as quirky homes, animal shelters, ad hoc storage and make-out spots. The peculiar program of bunkerization, which lasted Hoxha’s entire 40-year rule, resulted in one bunker for every four citizens.

.

.

The 40-year-old Brasfield was with his girlfriend, Shaquina Baxter, in the parking lot of a Motel 6 on Dania Beach Boulevard when he released the 12 shiny, red and silver mylar balloons into the sky and watched them float away in the Sunday morning breeze. But the trooper saw nothing more than probable cause for a crime against the environment. Apparently, lawmakers in the Sunshine State think it’s appropriate to treat what should have been, at most, simple littering (to which courts would have issued a fine, maybe?), into a major crime against Mother Nature. As if Florida jails weren’t full enough. The trooper arrested Brasfield and charged him with polluting to harm humans, animals, plants and everything else living under the Florida Air and Water Pollution Control Act. “Endangered marine turtle species and birds, such as wood storks and brown pelicans, seek refuge in John U. Lloyd State Park, about 1.5 miles east of the motel,” said the paper.

.

.

Thaune Nunes Ferreira, 29, was arrested on Sunday for using prosthetic fingers to fool the biometric employee attendance device used at the hospital where she works near Sao Paulo. She is accused of covering up the absence of six colleagues.

.

.

Facebook users are unwittingly revealing intimate secrets – including their sexual orientation, drug use and political beliefs – using only public “like” updates, according to a study of online privacy. The research into 58,000 Facebook users in the US found that sensitive personal characteristics about people can be accurately inferred from information in the public domain. Researchers were able to accurately infer a Facebook user’s race, IQ, sexuality, substance use, personality or political views using only a record of the subjects and items they had “liked” on Facebook – even if users had chosen not to reveal that information. The study will reopen the debate about privacy in the digital age and raise fresh concerns about what information people share online.

.

.

Beyond this, we need to examine the culture of incarceration responsible for keeping a substantial portion of the U.S. population imprisoned under what can only be deemed inhumane conditions. Current U.S. policies regarding solitary confinement are controversial not only considering definitions of torture under international law but also in light of our own Eighth Amendment, which prohibits cruel and unusual punishment. As Senator Dick Durbin urged in his June 19, 2012 appeal to the Senate Committee on the Judiciary (PDF), the stakes are high: More than 80,000 inmates are currently held in isolation in so-called Security Housing Units (SHUs), according to a 2005 Bureau of Justice Statistics census. They are locked up for as long as 23 hours a day in small single cells, without windows or direct access to natural light, and without meaningful activities of any kind. What does our ongoing tolerance of this practice say about us as a society?

.

.

“Man I feel dirty looking at these pics,” wrote one forum poster at Hack Forums, one of the top “aboveground” hacking discussion sites on the Internet (it now has more than 23 million total posts). The poster was referencing a 134+ page thread filled with the images of female “slaves” surreptitiously snapped by hackers using the women’s own webcams. “Poor people think they are alone in their private homes, but have no idea they are the laughing stock on HackForums,” he continued. “It would be funny if one of these slaves venture into learning how to hack and comes across this thread.” Whether this would in fact be “funny” is unlikely. RAT operators have nearly complete control over the computers they infect; they can (and do) browse people’s private pictures in search of erotic images to share with each other online. They even have strategies for watching where women store the photos most likely to be compromising.

.

.

The number of dead pigs found in Shanghai’s main river has doubled in two days to nearly 6,000, the government said, as residents worried over the water supply questioned the handling of the incident. Shanghai had pulled 5,916 dead pigs out of the Huangpu river, which cuts through China’s commercial hub and supplies 22 percent of its water, since Saturday, the local government said in a statement late Tuesday. The number of pigs taken out of the river—believed to have been dumped by farmers upstream after dying of disease—had started to fall on a daily basis, it added, and water quality was within national standards.

.

.

The Louisiana voucher schools under GOP Governor Bobby Jindal had already gotten into trouble last year for using a variety of religious right schoolbooks that teach a number of crazy, and racist, theories, including: The Ku Klux Klan was a force for good “[The Ku Klux] Klan in some areas of the country tried to be a means of reform, fighting the decline in morality and using the symbol of the cross. Klan targets were bootleggers, wife-beaters, and immoral movies. In some communities it achieved a certain respectability as it worked with politicians.”—United States History for Christian Schools, 3rd ed., Bob Jones University Press, 2001 Majority of slaves in the old south were treated well “A few slave holders were undeniably cruel. Examples of slaves beaten to death were not common, neither were they unknown. The majority of slave holders treated their slaves well.”—United States History for Christian Schools, 2nd ed., Bob Jones University Press, 1991

.

.

A New York town that began assigning an armed police officer to guard a high school in the wake of the Connecticut massacre has suspended the program after an officer accidentally discharged his pistol in a hallway while classes were in session. Lt. James Janso of the Lloyd police department tells media outlets Officer Sean McCutcheon will be suspended while an investigation continues.

.

.

In the latest incident of anti-gun hysteria to erupt in a school setting, officials at an elementary school in small-town Michigan impounded a third-grader boy’s batch of 30 homemade birthday cupcakes because they were adorned with green plastic figurines representing World War Two soldiers. The school principal branded the military-themed cupcakes “insensitive” in light of the Sandy Hook Elementary School shooting, reports Fox News Radio. “It disgusted me,” Casey Fountain, the boy’s father, told Fox News. “It’s vile they lump true American heroes with psychopathic killers.”

.

.

Chilling Final Photos of Murder Victims Taken by Their Killers

Many serial killers take photos of their victims–both dead and alive–to keep a record of their work, to refer to later for self-pleasure, and sometimes to taunt police. Here are a few images taken by serial killers of their victims while they were still alive. Most know they’re doomed, others are still unaware of what’s to come.

Allow your eyes to scroll down the page to imbibe this unique New York Times Home section. After a little observation, I concluded that the presentation applies established formulas for inserting subliminal messages into an innocuous scene. In reading the text of the article, I searched in vain for any reference to the subject matter of the picture that appears centrally above the couch-bed, above the fold, on the first page of this presumably wholesome section of the newspaper that proudly proclaims it prints only the news that is “fit to print.” In the case of this article, the Times editors seem to have ignored their motto, exposing their reading public to a media presentation with a concealed agenda and precious little news value. While the centrally located picture begs for our attention, the text of the article directs our eyes to the pattern on the fabric wallpaper, to the furniture barely visible at the extreme left of the photograph, indeed, to anything but the picture….

.

.

Born in Mexico in 1834, Julia Pastrana was an indigenous woman living with two very rare diseases: generalized hypertrichosis lanuginosa, which covered her body and face in thick hair, and gingival hyperplasia, which thickened her lips and gums. She took part in 19th-century exhibition tours throughout Europe, where she entertained people with her bear-like features. Her life story is both sad and fascinating. In 1859, Pastrana became pregnant after marrying Theodore Lent, an impresario who was traveling at freak shows with her across Europe and the United States. Unfortunately, her infant son also inherited her hypertichosis and passed mere hours after his birth in Moscow. Pastrana also died after a few days from severe complications. Following the death of both his wife and son, Lent embalmed their bodies and began exhibiting them while on tour. Lent also remarried after meeting a bearded woman in Germany, whom was later billed as Pastrana’s sister, Zenora.

.

.

There is no goofier Hollywood invention than the Flamboyant Killer. Whether you were raised on the Friday the 13th movies or Saw-type torture porn, they all have a slapstick quality that lets you know that in the real world, people like this just don’t exist. Real killers are, of course, much stranger.

FRONTLINE investigates why Wall Street’s leaders have escaped prosecution for any fraud related to the sale of bad mortgages.

.

.

And I’ll just say here, if you’re caught with an ounce of cocaine, the chances are good you’re going to go to jail. If it happens repeatedly you may go to jail for the rest of your life. But evidently, if you launder nearly a billion dollars for drug cartels and violate our international sanctions, your company pays a fine and you go home and sleep in your own bed at night. Every single individual associated with this. I just, I think that’s fundamentally wrong.

.

.

“There was a guy there, a well-dressed guy, standing next to a car that had a vanity plate,” he said. “And the plate read, ‘FUND’EM.'” Winston, curious, asked the guy what the plate meant. The man laughed and said, “That’s Angelo Mozilo’s growth strategy for 2006.” Here’s how Winston described the rest of the story to PBS – i.e. what happened when he asked the man to elaborate: “What if the person doesn’t have a job?” “Fund ’em,” the – the guy said. And I said, “What if he has no income?” “Fund ’em.” “What if he has no assets?” And he said, “Fund ’em.” Later on, Winston would hear that the company’s unofficial policy was that if a loan applicant could “fog a mirror,” he would be given a loan. This kind of information is absolutely crucial to understanding what caused the subprime crisis. There are people out there still willing to argue that the government somehow “forced the banks to lend” to unworthy applicants. In reality, it was unscrupulous companies like Countrywide …

.

.

Then Christine stumbled upon a controversial homemade herbal remedy that she credits with enormously improving her dog’s quality of life. She’s grateful that, in his final year, Sampson weighed in at a robust 106 pounds and lived free of the wracking pain that had haunted him. Whereas before Sampson had been too weak to walk, almost overnight he became a born-again youngster. “He was a puppy again, happy and playful,” Christine recalls. “He’d trot around the house with his toys in his mouth, wanting to play fetch!” The name of the controversial herbal remedy Sampson took? Cannabis. Inspired by reports of medical marijuana helping human cancer patients, Christine started digging online. The search terms? “How to administer cannabis to a dog.” Christine — who, for the record, is not a recreational cannabis user — was initially concerned about giving it to her dog because of the bad press she’d heard about the plant. But after giving Sampson cannabis flower-bud material mixed with…

.

.

When George Palmer Putnam went to the War Department to secure photographs for “The Horror of It,” a little volume containing stark pictures of the war, which has just been published, Major General Carr of the Signal Corps refused to show him any pictures showing war’s gruesome results. “Only those photographs showing the pleasant aspects of war can be released,” the General said. “The Department has a moral obligation to the Gold Star Mothers.”

.

.

Advances in bioengineering have been able to produce meat analogs, but the process has always been stupendously expensive, and the results were only passable. It turns out that it’s actually very difficult to match the taste and texture of animal muscle tissue by growing cells in the lab. The marbling of fats and connective tissue is integral to the experience of eating a burger. Applying 3D printing to artificial meats could be the answer, according to Forgacs. If you take tissue engineering and add in some 3D printing, you get the burgeoning field of bioprinting. Researchers are working with cell aggregates as the medium in bioprinting (as opposed to plastics in regular 3D printing). Layer after layer of cells can be laid down to more closely resemble the genuine article. Researchers can basically build a block of muscle that never lived.

.

.

.

.

So with Monsanto products themselves amongst the key suspects in Colony Collapse Disorder, one might ask: Why has the multinational bought a company which has been a key player in researching this disorder as well as Israeli Acute Paralysis Virus, another scourge of bees? “We’re absolutely committed to Beeologics’ existing work,” said Monsanto spokesperson Kelly Powers. Yet one has to wonder if owning a firm dedicated to shedding light on the trouble with bees might not serve Monsanto’s interest in allowing it to further cover up their own corporate complicity in the problem. Let us hope that Monsanto is as good as its word and uses this newly acquired company to boldly get to the bottom of the mystery of the disappearing bees. But if history is any guide, there is little cause for optimism. The health watchdog group “Natural Society” rated Monsanto “the worst in 2011 for its ongoing work to threaten human health and the environment.”

.

.

Police and prosecutors said Long was at McAloon’s Alameda Street apartment at a party McAloon was throwing for a 13-year-old relative and that teen’s friends. Ashley inhaled helium from a tank with the intent to make her voice higher-pitched, and collapsed after an air bubble entered her blood stream and blocked blood flow.

.

.

Nearly 80 percent of New York City high school graduates need to relearn basic skills before they can enter the City University’s community college system. The number of kids behind the 8-ball is the highest in years, CBS 2′s Marcia Kramer reported Thursday. When they graduated from city high schools, students in a special remedial program at the Borough of Manhattan Community College couldn’t make the grade. They had to re-learn basic skills — reading, writing and math — first before they could begin college courses.

.

.

There’s a set of photos making the rounds on the Internet these days, but even though they recently went viral, they were actually released a year ago. They show a bunch of normal-looking walnuts that when cracked open reveal a very hard filling – concrete pebbles. According to Ministry of Tofu, these fake walnuts were bought by a certain Mr. Li, last February, from a street vendor in Zhengzou, Henan province. When he got home and started cracking them, he noticed that instead of a meaty seed, many were actually filled with concrete pebbles wrapped in tissue. But Li’s case is not an isolated one. Apparently, many Chinese walnut vendors try to maximize their profits by carefully cracking open the hard shell, taking out the nutmeat, replacing it with concrete and tissue so it doesn’t make a strange noise, and gluing it shut. This way they can sell the nuts and the seeds separately.

.

.

So it would’ve cost more than $211,000, and that’s before ResultSource’s fee, which is typically more than $20,000. Kaplan settled for making the Journal’s list, reaching the pre-sale figure of 3,000 by securing commitments from corporate clients, who agreed to buy copies as part of his speaking fees, and by buying copies for himself to resell at public appearances. Kaplan expresses significant reservations about taking part in what is essentially a laundering operation aimed at deceiving the book-buying public into believing a title is more in-demand than it is. “It’s no wonder few people in the industry want to talk about bestseller campaigns,” he writes “Put bluntly, they allow people with enough money, contacts, and know-how to buy their way onto bestseller lists.”

.

.

I was 17, and the owner of an irregular music collection that numbered about 20 albums, most of them a real shame (OMC’s How Bizarre, the Grease 2 soundtrack). One day I had unsupervised access to the family PC and, for reasons forgotten, an urge to hear the campy orchestral number from the film Austin Powers. I was a model Napster user: internet-equipped, impatient and mostly ignorant of the ethical and legal particulars of peer-to-peer file-sharing. I installed the software, searched Napster’s vast list of MP3 files, and soon had Soul Bossa Nova plinking kilobyte by kilobyte on to my hard drive. “It’s difficult to describe to people… how much material was suddenly available,” the technology guru John Perry Barlow tells Alex Winter, the director of Downloaded, in his new documentary. Speaking to me on the phone from the US, Winter added: “There was no ramp up. There was no transition. It was like that famous shot from 2001: A Space Odyssey, when the prehistoric monkey throws a b…

.

.

The US Library of Congress welcomed Moby Dick onto its vaunted shelves this week but it wasn’t the famous Herman Melville-penned whale tale version oh no, it was the version told exclusively in emoticon – you know those little signs like J, ;). Emoji are the emoticons typically used in Japanese texting though they obviously are used world-wide to annoy or entertain everyone depending on your opinion of them. Called “Emoji Dick,” the emoticon book project was undertaken back in 2009 by data engineer Fred Benenson. According to the Library of Congress’ blog, in 2009 Benenson started a campaign to fund the “Emoji Dick” project and within a month raised enough money to put it together – $3,500.

Fans sprayed with debris. Someone got mashed by a tire. NASCAR tried to take this down.

.

.

.

.

According to Las Vegas Metro Police, an officer was patrolling the 300 block of N. 16th st. Tuesday when he came across a naked woman who appeared to be engaged in sexual relations with a dog. Officers arrived on the scene to find the woman, who was still undressed, laying on the ground. When the woman saw officers approaching, she said “Hi” to them and then began fondling the dog in a sexual manner.

.

.

CNN may have just posted their best piece of investigative journalism in years. In the following video, three drivers of varying ages got incredibly high on marijuana and test-drove cars around a course. A driving-ed instructor accompanied them to avert any chance of an accident, and police watched from the sidelines to spot any visible ‘signs’ of inebriation in their movements.

.

.

Remember that Higgs-like particle that scientists finally managed to pin down last year at the Large Hadron Collider? Well, it’s proving to be a harbinger of bad news. According to Joseph Lykken, a theoretical physicist at the Fermi National Accelerator Laboratory, the mass of the Higgs boson indicates that “the universe we live in is inherently unstable, and at some point billions of years from now it’s all going to get wiped out.”

.

.

I love this. I know that the comments are going to be filled with people decrying the destructive aspects of ‘Gallon Smashing,’ and they’re not wrong, but there’s so much that’s great about this concept. There’s a level of straight up slapstick comedy that is incredible. This kid (is it the same kid every time? I think it might be) has the moves of a silent comedy star. I like that the prank isn’t necessarily about getting other people wet or anything (although that happens, as is the unpredictable nature of smashing gallons of milk). And I like that this guy seems to be in his teens – exactly the right age to be doing stupid, destructive, anti-social prank behavior. When frat boys start doing this it won’t be funny.

.

.

The list of 10 tips by the University of Colorado at Colorado Springs was billed as “last resort” options to deter a sexual assault. “Tell your attacker that you have a disease or are menstruating,” read one tip. “Vomiting or urinating may also convince the attacker to leave you alone,” read another.

Thanks Jasmine

.

.

For example, the following actions may get an American citizen living on U.S. soil labeled as a “suspected terrorist” today: Being young (if you live near a battle zone, you are fair game; and see this) Using social media Reporting or doing journalism Speaking out against government policies Protesting anything (such as participating in the “Occupy” movement) Questioning war (even though war reduces our national security; and see this) Criticizing the government’s targeting of innocent civilians with drones (although killing innocent civilians with drones is one of the main things which increases terrorism. And see this) Asking questions about pollution (even at a public Congressional hearing?) Paying cash at an Internet cafe Asking questions about Wall Street shenanigans Holding gold Creating alternative currencies Stocking up on more than 7 days of food (even though all Mormons are taught to stockpile food, and most …

.

.

Earlier this month, “revenge porn” entrepreneur Craig Brittain sat for an on-camera interview with CBS4-Denver, where he explained how his website IsAnybodyDown is nothing more than “entertainment.” Brittain’s site shows nude pictures of people, mostly women, without their consent, along with their personal contact info. The website advertises links to a service called “Takedown Hammer” which promises to get victims off the site if they pay $250. Many assume the “Hammer” is Brittain, since its e-mails come from the same IP address; Brittain denies it. In any case, to many of the victims, Brittain’s site looks like a simple extortion scheme.

.

.

Facebook, Twitter, The New York Times. The United States of America. All seemingly hacked by the Chinese. China. Seemingly hacked by the US. Big time. But is there another option? “At least 40 companies including Apple Inc., Facebook Inc. and Twitter Inc. were targeted in malware attacks linked to an Eastern European gang of hackers that is trying steal company secrets, two people familiar with the matter said.” Bloomberg Chinese-hackers According to Tom Kellerman of Trend Micro there could well be – “We’ve all been watching China, but they’re not the most advanced cybercriminals. The most advanced are from the Eastern Bloc and Russia.” Tom Kellerman via CNN

.

.

A protest staged by dairy farmers in Brussels has entered its second day. Farmers sprayed thousands of litres of fresh milk at the European Parliament in Brussels on Monday in protest at what they say are excessive milk quotas and prices below the cost of production.

.

.

The testimony at the hearing made it very clear that airport security is only as strong as its weakest link. This seems self-evident. Yet, despite all the money and manpower wasted on airport security theater in this country and around the world, perimeter security remains so lax that a guy with a costume and some bolt cutters can make a hole large enough to drive a van through. This is great news for heist fans, to be sure. But it’s pretty alarming for everyone else.

.

.

All disruptive technologies upset traditional power balances, and the Internet is no exception. The standard story is that it empowers the powerless, but that’s only half the story. The Internet empowers everyone. Powerful institutions might be slow to make use of that new power, but since they are powerful, they can use it more effectively. Governments and corporations have woken up to the fact that not only can they use the Internet, they can control it for their interests. Unless we start deliberately debating the future we want to live in, and the role of information technology in enabling that world, we will end up with an Internet that benefits existing power structures and not society in general.

.

.

Porn legend Ron Jeremy, 59, has been released from hospital after a near-death experience and he’s already planning on getting back to business. Doctors have told the prolific star that he’s cleared to have sex after he left Cedars-Sinai Medical Center in Los Angeles around week ago.

.

.

.

.

“I had a sinking felling because my porn collection is valuable, man,” Johnson told WZZM 13. Johnson collects rare performances by black adult film stars that were difficult for him to find and impossible to replace. He says the stolen pornography collection is worth $7,500, much more than the televisions that were taken. “I had a collection that had every African American that’s ever been in porn, from the 70s up until now,” explained Johnson. “My collection was the best in Michigan– a guy in Connecticut told me that,” said Johnson. He believes the thieves realized the value when they stumbled on the porn. “They came upon it and looked at the titles and realized what they had ran across… and realized people will pay cash money for them DVDs.” Johnson says his rare footage can’t be found on the internet. “I trade and I collect and I look at them too. I ain’t got no problem with that,” said Johnson.

.

.

The BGI Cognitive Genomics Project is currently doing whole-genome sequencing of 1,000 very-high-IQ people around the world, hunting for sets of sets of IQ-predicting alleles. I know because I recently contributed my DNA to the project, not fully understanding the implications. These IQ gene-sets will be found eventually—but will probably be used mostly in China, for China. Potentially, the results would allow all Chinese couples to maximize the intelligence of their offspring by selecting among their own fertilized eggs for the one or two that include the highest likelihood of the highest intelligence. Given the Mendelian genetic lottery, the kids produced by any one couple typically differ by 5 to 15 IQ points. So this method of “preimplantation embryo selection” might allow IQ within every Chinese family to increase by 5 to 15 IQ points per generation. After a couple of generations, it would be game over for Western global competitiveness.

.

.

Starting next week, most U.S. Internet users will be subject to a new copyright enforcement system that could slow the Internet to a crawl and force violators to take educational courses. A source with direct knowledge of the Copyright Alert System (CAS), who asked not to be named, has told the Daily Dot that the five participating Internet service providers (ISPs) will start the controversial program Monday. The ISPs—industry giants AT&T, Cablevision, Comcast, Time Warner, and Verizon—will launch their versions of the CAS on different days throughout the week. Comcast is expected to be the first, on Monday.

.

.

Now, people are being warned about another risk of finding love in the online world – webcam extortion. Webcam extortion. Image from ShutterstockBut it’s not the familiar headline of perverted hackers blackmailing young women into stripping in front of the camera. This time the tables have turned, and it’s *men* who are being victimised by *women*, in a peculiar twist on traditional webcam extortion. Singapore’s Police Force has warned of femme fatales befriending potential victims on sites such as Facebook and Tagged.com. The women enter steamy webcam conversations with their prey, where they strip and encourage their male victim to do the same. What the man doesn’t realise, as he feverishly rips his clothes off and agrees to engage in various sexual acts in front of the camera, is that his female love interest is secretly recording everything that’s going on. The male victim is then blackmailed for money by the woman who threatens to circulate the compromising photographs

.

.

Of course, we’ve seen this pattern over and over and over. The government uses “terrorism” as a catalyst to gain some powerful new surveillance tool or ability, and then turns around and uses it on ordinary citizens, severely infringing on their civil liberties in the process. Stingrays are particularly odious given they give police dangerous “general warrant” powers, which the founding fathers specifically drafted the Fourth Amendment to prevent. In pre-revolutionary America, British soldiers used “general warrants” as authority to go house-to-house in a particular neighborhood, looking for whatever they please, without specifying an individual or place to be searched. The Stingray is the digital equivalent of the pre-revolutionary British soldier. It allows police to point a cell phone signal into all the houses in a particular neighborhood, searching for one target while sucking up everyone else’s location along with it. With one search the police could potentially invade count…

.

.

“Slave Labor (Bunting Boy),” a 2012 work by the mysterious British graffiti artist Banksy, has vanished from a wall outside a discount store in London, and turned up at an auction house in Miami. And the town council in Haringey, the north London borough where the Banksy work appeared last May and disappeared last week, say that they want the piece returned. The stenciled piece, which shows a young boy at an old fashioned sewing machine creating a string of Union Jacks – the flags are in bright red, white and blue; the rest of the picture is in black, white, grey and sepia – appeared last year during the celebrations commemorating Queen Elizabeth’s 60 years on the throne. It was taken as an acerbic social comment, as most of Banksy’s works are, and has been regarded as a cultural attraction in the Turnpike Lane neighborhood where it stood.

.

.

Wow, is this a crazy media frenzy. We should know better. These attacks happen all the time, and just because the media is reporting about them with greater frequency doesn’t mean that they’re happening with greater frequency. Hype aside, the Mandiant report on the hackers is very good, especially the part where the Chinese hackers outted themselves through poor opsec: they logged into Facebook from their work computers. But this is not cyberwar. This is not war of any kind. This is espionage, and the difference is important. Calling it war just feeds our fears and fuels the cyberwar arms race.

.

.

JSAN is a writing style anonymization framework. It consists of two parts: JStylo and Anonymouth. JStylo is a standalone platform for authorship attribution. It is used as an underlying feature extraction and authorship attribution engine. Anonymouth is the writing style anonymization platform. It uses the extracted stylometric features and classification results obtained through JStylo and suggests users changes to anonymize their writing style.

.

.

It’s been used to question or confirm the authorship of Shakespeare’s plays, Homer’s Illiad and Odyssey and St Paul’s letters for hundreds of years. Now the science of stylometry could be used in the fight against hackers, trolls and malware writers that wreak havoc on the web. At the same time, stylometry – the analysis of a person’s unique writing style – could also be used by employers to identify whistleblowers or whingers among their staff. What you say online could be traced back to you using stylometry. “Your writing style can give you away and on the internet anonymity is difficult to achieve,” say the US researchers who have developed online tools to analyse writing. Advertisement The researchers, from Drexel University in Philadelphia, studied the leaked conversations and contributions of hundreds of anonymous users in underground online forums. They were able to identify 80 per cent of users using stylometric analysis to match writing styles to authors.

.

.

Barnacles are known for having very long penises. National Geographic reported in 2008: To cope with changing tides and a sedentary lifestyle, the gnarly crustaceans have evolved penises that are eight times the length of their bodies—the longest relative to body size of any animal. My sedentary lifestyle has had no such effect. I feel cheated. That article also noted that barnacles have the ability to change the size and shape of their penises to suit their living conditions. Barnacles living in gentle waters have long, thin penises best equipped for maximum reach, the study found. But those animals living in rough waters have shorter, stouter penises that are better able to withstand strong waves. […] The researchers also transplanted barnacles living in gentle waters to rough waters and vice versa, to make sure the penis variations they observed were a result of the environment and not due to genetic differences. The results showed that barnacles coul…

.

.

Facebook OAuth is used to communicate between Applications & Facebook users, to grant additional permissions to your favorite apps. To make this possible, users have to ‘allow or accept’ the application request so that app can access your account information with required permissions. As a normal Facebook user we always think that it is better than entering your Facebook credentials, we can just allow specific permissions to an app in order to make it work with your account.

More than 200 years of disease and death transmitted through metzitzah b’peh, the direct mouth-to-genital suction done by mohels to the bleeding just-circumcised-penises of baby boys.

.

.

The document includes advice such as “hide under thick trees” (believed to be bin Laden’s contribution), and instructions for setting up a “fake gathering” using dolls to “mislead the enemy”. Found by the Associated Press in a building in Timbuktu, the ancient city occupied by Islamists last year, the document is believed to have been abandoned as extremists fled a French military intervention last month. It is a Xeroxed copy of a tipsheet authored by a Yemeni extremist that has been published on some jihadi forums, but that has made little appearance in English. The list reflects how al-Qaeda in the Islamic Maghbreb anticipated a military intervention that would make use of drones, as the war on terror shifts from the ground to the air.